Monthly Archives: December 2016

As technology rapidly evolves, so does the potential for its exploitation. While there is always a new threat in the technology space, security experts stress that not every threat should incite an immediate sense of panic. In 2016 alone, several…

Evolving threat landscape reveals a growing need for security intelligence In 2016, the world’s biggest cyber-threats were related to money, information and a desire to disrupt. They included the underground trade of tens of thousands of compromised server credentials, hijacked…

A research published by security company CrowdStrike reveals that hackers who are part of Fancy Bear group managed to breach Ukraine’s artillery systems using a compromised Android application. The report reveals that the malware was used to track artillery units…

Cybersecurity experts are warning that a new type of malicious software known as Gooligan has infected more than 1 million Android devices worldwide and is spreading at a rate of 13,000 devices a day. The malware has the ability to…

It’s been a banner year for cybercriminals. Data breaches, ransomware and phishing attacks have all been growing threats. Scams are so rampant that Juniper Research is predicting that the cost of data breaches will rise to over $2 trillion globally…

Locky ransomware made up 6 percent of all malware attacks during November. Image: F-Secure Cyberattacks using the most common forms of ransomware spiked during November, continuing the ongoing trend for growth in the use of the file-encrypting malicious software by…

The smartphone has become one of the most important tools in millions of Americans’ lives. It tracks your movements, displays emails and text messages, and notifies you of every birthday and appointment. Every second, information floods your smartphone. Unless you…

In order to stay safe from such scam apps, Trend Micro is advising users to steer clear of third-party app stores entirely, especially when downloading apps that claim to be the “unofficial” or “unreleased” versions of legitimate apps. Users can…